Dotfiles feel too personal to share
Privacy, Sensitivity, and “Intimacy” of Dotfiles
- Many feel uneasy publishing dotfiles because they expose hostnames, IPs, paths, RSS feeds, backup scripts, recent files, and other behavioral traces.
- Others describe a more emotional discomfort: dotfiles feel like a messy private sketchbook full of hacks, jokes, swears, and half-broken experiments, unlike polished professional code.
- A minority think this is overblown, arguing almost nobody reads random dotfile repos and comparing the concern to extreme nerdy self-consciousness.
Strategies to Separate Public and Private Content
- Common pattern: split into public vs private layers. Examples:
- Public “base” files that source private, machine- or employer-specific files.
- Large
.gitignoresections to exclude sensitive or noisy configs. - Secrets moved into untracked files (
~/.secrets), password managers (e.g., 1Password URLs), or separate private repos.
- Several tools are discussed:
- Chezmoi (with gpg/age encryption, partial-file encryption, secret scanning via gitleaks,
merge-allfor drift, and editor integrations). - Nix + home-manager, myba, custom “context” systems, simple git+cron setups.
- Chezmoi (with gpg/age encryption, partial-file encryption, secret scanning via gitleaks,
- General advice: categorize into secrets/env, local overrides, and generic shareable config; only the last should be public.
Value and Culture of Sharing
- Many say they’ve learned a lot from others’ dotfiles (e.g., shell aliases, vim functions) and rarely clone wholesale, instead copying small ideas.
- Some enjoy being able to answer “How did you set that up?” with a single repo link; others feel compelled to clean and document configs before publishing.
- Several recommend being generous with dotfiles, especially for mentoring newer developers.
Defaults vs Customization and Remote Machines
- Ops/SRE-leaning commenters often avoid heavy customization (especially editor plugins) to stay effective on bare remote servers, leaning into defaults as a “zen” practice.
- Others strongly reject this, arguing it’s worth investing in a tailored environment and bringing it along (sync’d dotfiles,
sshrc-style tricks, containers, Emacs/TRAMP), especially for dev-heavy workflows.
Security and Threat Modeling
- Many emphasize keeping secrets out of dotfiles even in private repos; dotfiles can aid social engineering and fingerprinting.
- A security researcher argues the larger risk is supply-chain compromise via package managers (Homebrew, pip, nix, etc.), claiming that once those are in use, public dotfiles add little incremental risk.
- Some readers find this stance alarmist but accept that supply-chain attacks on package ecosystems are real and increasing.